Microsoft installer package

 Other Check for genuineness Contact author if essential and if required to report an issue


 Contact information Read reports of incidents reported earlier or in a previous version Fixes made available in the current version Software can be downloaded, installed and un-installed remotely by a privileged / authorized user only


 Run / Run as administrator


  From command prompt

 Cancel un-installation - Check if all / partial files are removed / deleted from the installed location

 Delete supporting files from the installed folder to check if un-installation completes or errors out

 Add / delete files from the installed folder to test changes to the software installed Check for read, write and execute permission to the files in the installed folder

 Install, un-install and re-install the software to check if the files are added / removed accordingly and no traces of files / folders are available post an un-install Un-install the software on various devices on different Operating systems with various different privileges Test by changing system date and time for licensing and install software to systems remotely and directly on an authorized and un-authorized system Test to un-install and guide the user to un-install a software by reading out from the un-installation guide Un-installation removes installed files and folders completely. Install on the same machine to a different location - un-install Install on the same machine with a different folder name - un-install Cancel un-installation - check if the files and folders are partially / completely removed Un-install and re-install - check the files / folders removed and added

 Regedit Check the registry post un-installation

Un-Installation guide

 Check for the correctness of new features added, fixes provided and update version - across the manual Available in different languages with instructions to download, install, setup, trouble shoot and un-install

Download and Installables

 Genuine software Virus free

Localization and Internationalization

 Available and accessible by all it's users across nations Ease of access Modes of access Genuine and piracy free


 Who can download and install? Who can execute the installed software? Define read, write, execute permissions to users on your network Block / revoke access to users no longer in your network / enterprise

Control Panel

 Tests in Control Panel: Un-installed software does not feature in the programs and features Can be un-installed Notifications / Updates / Subscription E-mails are no longer available Can be un-installed by a privileged user


 Enable logging to check the ip addresses on which a software is installed Number of executable requests sent Un-installation notes are logged


 Timely audit the systems in your network Check the logs for suspicious and unauthorized installations Record and report any malware's installed Maintain strict guidelines to keep a check on piracy Enforce use of genuine softwares


 Record the number of licenses available and distributed Alert the users on an expired license Renew and check the validity of a license Validate the license key for authenticity and the installer for authorization

File Tranfers

 Block the transfer of executables via Emails Block the transfer of suspicious and unauthorized files over the Firewall Check the incoming files and file size as the .exe can be masked to any other extension to gain an entry into a firewall protected system


 The number of installations made per IP address / person / day Number of requests raised for software installations without a valid business reason


 Not always a threat Base the request made to install a freeware on usability Authorize and provide guidelines to use freewares Report any incident to the IT Infrastructure team if there is one when using a freeware


 Check the performance of un-installation from command prompt Versus un-installing from control panel versus un-installing remotely

 Study the performance on different devices and operating systems


 Unauthorized users do not have download and install permission Password protected files can be executed by privileged users Software can be downloaded, installed and un-installed remotely by a privileged / authorized user only Any breach is reported to the concerned person / team Guidelines to install and un-install are made available only to the authorized users Information relating to software maintenance is made available and is addressed only to the authorized users and is done timely Any changes to the files and permissions to the installed folder is reported to the concerned team

 Check that the package / seal is not broken when the software is purchased Beware of license thefts Beware of cheap imitations luring naive customers to download /buy a software from an unauthorized online / offline buyer Click on links in emails only after thorough investigation Restrict auto-execution of executables wherever required


 Un-installation removes files and folders from the installed location Control panel no longer reflects the software un-installed

 Report any discrepancy from the claims made


 Spell and grammar check is done before releasing the software Check for valid success and error messages Length / size /color / font of the message box / alerts is checked Re-direct the user to the software site for re-download / re-install in case of any errors for freewares


 Remember to test these ideas on different mobile devices and Operating Systems